External
A popular choice for customers with an internet presence. We’ll take a close look at your internet facing systems (including cloud hosted) and use our hacking skills in an attempt to safely breach your network perimeter.
This is not a vulnerability scan, as our pentesters will attempt to breach your perimeter, pivot to other opportunities, exfiltrate critical data, obtain and crack password hashes, and demonstrate how a foothold would be maintained.